Archive for Data protection

The Value of Stolen Credentials

The Value of Stolen CredentialsThe evolution of Web 2.0 services and the parallel world of cybercrime is driving up the value of stolen credentials. That is the price that criminals charge each other for stolen user login information. The price of a file of user credentials, aka a `dump’ depends on the Internet service(s) where they can be used, Amichai Shulman, CTO of Imperva told Help Net Security.

Impeva logoImperva CTO Shulman told Net Security, “Just five years ago, the illegal trade in credit card details was a rising problem for the financial services industry, as well as their customers, with platinum and corporate cards being highly prized by the fraudsters … there are reports of Twitter credentials changing hands for up to $1,000 owing to the revenue generation that is possible from a Web 2.0 services account. This confirms our observations that credentials can fetch a high sum according to both the popularity of the application and the popularity of the account in question.”

The value of stolen credentials

This is illustrated by the ‘going rate’ of $1.50 for a Hotmail account, and $80.00-plus for a Gmail account. As a service, Hotmail has fallen out of favor, while Gmail’s all-around flexibility means it is a central service for business users, Mr. Shulman said. The result is that Gmail credentials can also give access to a range of Google cloud services. The vulnerable services including Google Docs and Adword accounts. Mr. Shulman explained that Google Docs can contain valuable additional information on the legitimate owner. Furthermore, an Adwords account can allow criminals to manipulate existing and trusted search engine results.

Twittter logoIt is a similar story with Twitter accounts. The added dimension of the immediacy of a social networking connection said, Mr. Shulman. “Twitter accounts are valuable to criminals that they will use almost any technique to harvest user credentials, including targeted phishing attacks. Once a fraudster gains access to a Twitter account, they can misuse it in a variety of ways to further their fraudulent activities,” he said. This happens because users are reusing passwords on other sites Some of those other sites turn out to have not been secure.

That’s the thing; as soon as any of the sites you log in to gets compromised, the email address or username and password associated with it can be tried by the bad guy on various other services. Since most people re-use passwords, there’s a high likelihood that they will gain access to your account. From there, who knows what kind of damage they might cause. If you’re lucky, you’ll notice something’s amiss. Twitter advised that people are continuing to use the same email address and password (or a variant) on multiple sites. We strongly suggest that you use different passwords for each service you sign up for.

Stolen online banking credentials

In a related article, Trusteer reports that most online banking customers reuse their login credentials on non-financial websites. Trusteer found that 73% of bank customers use their banking account passwords to access much less secure websites. They also found that 47% use both their online banking user ID and password to log in elsewhere on the Internet.

Cybercriminals are exploiting the widespread reuse of online banking credentials. These criminals have devised various methods to harvest login credentials from less secure sources, such as webmail and social network websites. Once acquired, these usernames and passwords are tested on financial services sites to commit fraud.

The report’s key findings include:

  • 73% of users share the passwords which they use for online banking, with at least one nonfinancial website.
  • 47% of users share both their user ID and password with at least one nonfinancial website.
  • When a bank allows users to choose their own user ID, 65% of users share this ID with nonfinancial websites.
  • When a bank chooses the user ID for its customers, 42% use the bank-issued user ID with at least one other website.

Using stolen credentials remains the easiest way for criminals to bypass the security measures implemented by banks to protect their online applications, so we wanted to see how often users repurpose their financial service usernames and passwords,” said Amit Klein, CTO of Trusteer and head of the company’s research organization. “Our findings were very surprising, and reveal that consumers are not aware, or are choosing to ignore, the security implications of reusing their banking credentials on multiple websites.

If this isn’t a wake-up call to anyone with multiple IDs that use the same password, I don’t know what is. Internet users – especially those with business accounts – need to use different passwords for different services, or they could face the disastrous consequences of taking a slack approach to their credentials,” Shulman told Help Net Security.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Digital Swiss Army Knife

Digital Swiss Army KnifeVictorinox, the firm behind the legendary Swiss Army Knife, has introduced the Victorinox Secure Pro. The Secure Pro has a USB memory stick integrated into it along with the expected knives and screwdrivers. The firm claims it the most secure USB stick of its kind available to the public. The Secure Pro uses several layers of security to protect the data on it from being stolen.

The security layers included in the Swiss Army Knife include a fingerprint scanner linked to a heat and oxygen sensor. The sensor is capable of determining whether the user’s finger is still attached to a living person – so that a detached finger will not yield access to the memory stick’s contents. Any attempt to forcibly open the Victorinox Secure triggers a self-destruct mechanism that destroys the CPU and memory chip.

The Victorinox Secure Pro uses AES256 technology, together with MKI’s Schnuffi Platform Single Chip Technology. Martin Kuster, CEO of security chip specialist MKI, told InfoWorld,  “I’m concerned about the way technology is progressing, with all our personal data going into “the cloud.” Soon everything will go into the cloud – and I don’t like it! Perhaps one day I will have to buy back all this information from eBay!” The security integrates Single Chip Technology, meaning that there are no external and accessible lines between the different coding/security steps, as on multi-chip solutions; this makes cracking the hardware impossible.

Victorinox was so confident of Swiss Army Knife security that it offered a $150,000 prize to a team of professional hackers if they could break into it during the two hours product launch event. The money went uncollected. Victorinox Secure’s designer Kuster, stated, “Life is becoming more digital every day… And yet people do so little to protect their data. The world’s most common password is ‘12345’ – and even encryption can be broken given time.”

“We wanted to create not only a product for today’s modern lifestyle but a new generation of memory stick that had all the values of functionality and reliability that the iconic Swiss Army Knife has come to represent” stated Carl Elsener Jr., Victorinox’s CEO. “We think of the Victorinox Secure as the digital Swiss Army Knife.”

The Secure Pro Swiss Army Knife was launched 03-25-10 in London and is available in 8GB, 16GB, and 32GB sizes and will sell for $75 to $270. Additional features include:

  • LED Mini White Light
  • Retractable Ball Point Pen
  • Blade
  • Scissors
  • Nail File with
  • Screwdriver
  • Keyring

David Reinsel, group vice president of storage and semiconductor research at IDC was on-point when he stated, “It’s a cool product that will capture attention … adoption en-masse by corporations is quite another thing.” Reinsel told Newsfactor.com that there’s no doubt that data breaches are expensive for businesses in many ways. However, so is data on a computer that sits behind an encryption key that only the employee knows, he said. “Hence the age-old issue — corporations (most of them) want to control the encryption methodology and the keys,” Reinsel said. “Any corporate solution would have to allow for some type of master-key so that the company can get at a rogue employee’s data.”

rb-

Mr. Reinsel is on-point, this Swiss Army Knife, no matter the cool factor is a threat to the enterprise’s data. The size of the device can swallow a whole database and once it is encrypted with an individual’s key, it is pretty much gone. There is also the risk that some overambitious TSA agent will “confiscate” it if the user forgets to put the knife part of the device in checked baggage.

Despite all of that the cool factor is high and I want one.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Privacy Day 2010

Privacy Day 2010Data Privacy Day is January 28, 2010.  Data Privacy Day is an international celebration of the dignity of the individual expressed through personal information according to its sponsors. In this networked world, in which we are thoroughly digitized, with our identities, locations, actions, purchases, associations, movements, and histories stored as so many bits and bytes, we have to ask – who is collecting all of this – what are they doing with it – with whom are they sharing it?

For its part, Google (GOOG) has released a video highlighting the ways it uses some of that personal data it collects about you to make your life easier and then explains that you can opt-out of some of Google’s data collection policies.

Nicrosoft logoMicrosoft (MSFT) has released the results of a study on data privacy.  According to the Microsoft survey, the results illustrate how we, as a society, are still grappling with the intersection of privacy and online life. For example, 63 percent of consumers surveyed are concerned that online reputation might affect their personal and/or professional life, yet, less than half even consider their reputations when they post online content.

Finally, Fewer than 15%  of consumers in any of the countries surveyed believe that information found online would have an impact on their getting a job.  The Microsoft study found 70% of surveyed HR professionals in the U.S. have rejected a candidate based on online reputation information. Reputation can also have a positive effect as in the United States, 86% of HR professionals stated that a positive online reputation influences the candidate’s application to some extent; almost half stated that it does so to a great extent.

Electronic Frontier FoundationFor its part, the Electronic Frontier Foundation (EFF) has published, “The E-Book Buyer’s Guide to Privacy ” which outlines six elements of Ebook readers’ privacy policies:

The EFF surveyed the policies and found that Google Books and Amazon Kindle will monitor what you’re reading. The EFF also found that all the E-book readers will keep track of book searches and book purchases.  The Kindle, Nook, and Reader shared information collected on your book selections, searches, and purchases is shared outside the company without your consent. The good news is that the a free, open-source FBReader (for Windows/Linux) does not collect data on your book selections or searches.

Google Books and Amazon Kindle will monitor what you're readingThese privacy issues are important for citizens and businesses. Firms have to consider whether they are complying with laws and regulations requiring consumer privacy protections. They know that customers have to trust their technologies and services before they will use and pay for them.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.